Sciweavers

1282 search results - page 202 / 257
» Signing on signing off
Sort
View
FOCS
1992
IEEE
14 years 2 months ago
Maximizing Non-Linear Concave Functions in Fixed Dimension
Consider a convex set P in IRd and a piecewise polynomial concave function F: P IR. Let A be an algorithm that given a point x IRd computes F(x) if x P, or returns a concave po...
Sivan Toledo
ACMSE
2007
ACM
14 years 2 months ago
Semi-transparent video interfaces to assist deaf persons in meetings
Meetings are a vital part of participation in social activities. For a deaf person who does not understand spoken language, following a discourse at meetings can become confusing ...
Dorian Miller, Karl Gyllstrom, P. David Stotts, Ja...
CIKM
2007
Springer
14 years 2 months ago
Hypothesis testing with incomplete relevance judgments
Information retrieval experimentation generally proceeds in a cycle of development, evaluation, and hypothesis testing. Ideally, the evaluation and testing phases should be short ...
Ben Carterette, Mark D. Smucker
PKC
2010
Springer
183views Cryptology» more  PKC 2010»
14 years 2 months ago
Unlinkability of Sanitizable Signatures
Sanitizable signatures allow a designated party, called the sanitizer, to modify parts of signed data such that the immutable parts can still be verified with respect to the origi...
Christina Brzuska, Marc Fischlin, Anja Lehmann, Do...
EUROPKI
2007
Springer
14 years 2 months ago
OpenHSM: An Open Key Life Cycle Protocol for Public Key Infrastructure's Hardware Security Modules
Abstract. The private keys used in a PKI are its most important asset. Protect these keys from unauthorised use or disclosure is essential to secure a PKI. Relying parties need ass...
Jean Everson Martina, Túlio Cicero Salvaro ...